ISC SSCP System Security Certified Practitioner (SSCP) SSCP Exam Questions in PDF

Free ISC SSCP Dumps Questions (page: 17)

Which of the following choices describe a Challenge-response tokens generation?

  1. A workstation or system that generates a random challenge string that the user enters into the token when prompted along with the proper PIN.
  2. A workstation or system that generates a random login id that the user enters when prompted along with the proper PIN.
  3. A special hardware device that is used to generate ramdom text in a cryptography system.
  4. The authentication mechanism in the workstation or system does not determine if the owner should be authenticated.

Answer(s): A

Explanation:

Challenge-response tokens are:
- A workstation or system generates a random challenge string and the owner enters the string into the token along with the proper PIN.
- The token generates a response that is then entered into the workstation or system.
- The authentication mechanism in the workstation or system then determines if the owner should be authenticated.


Reference:

KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, 2001, John Wiley & Sons, Page 37. Also: HARRIS, Shon, All-In-One CISSP Certification Exam Guide, McGraw-Hill/Osborne, 2002, chapter 4: Access Control (pages 136-137).



What is called an automated means of identifying or authenticating the identity of a living person based on physiological or behavioral characteristics?

  1. Biometrics
  2. Micrometrics
  3. Macrometrics
  4. MicroBiometrics

Answer(s): A

Explanation:

Biometrics; Biometrics are defined as an automated means of identifying or authenticating the identity of a living person based on physiological or behavioral characteristics.


Reference:

KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, 2001, John Wiley & Sons, Pages 37,38.



In biometrics, "one-to-many" search against database of stored biometric images is done in:

  1. Authentication
  2. Identification
  3. Identities
  4. Identity-based access control

Answer(s): B

Explanation:

In biometrics, identification is a "one-to-many" search of an individual's characteristics from a database of stored images.


Reference:

KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, 2001, John Wiley & Sons, Page 38.



In biometrics, the "one-to-one" search used to verify claim to an identity made by a person is considered:

  1. Authentication
  2. Identification
  3. Auditing
  4. Authorization

Answer(s): A

Explanation:

Biometric devices can be use for either IDENTIFICATION or AUTHENTICATION ONE TO ONE is for AUTHENTICATION
This means that you as a user would provide some biometric credential such as your fingerprint. Then they will compare the template that you have provided with the one stored in the Database. If the two are exactly the same that prove that you are who you pretend to be.
ONE TO MANY is for IDENTIFICATION
A good example of this would be within airport. Many airports today have facial recognition cameras, as you walk through the airport it will take a picture of your face and then compare the template (your face) with a database full of templates and see if there is a match between your template and the ones stored in the Database. This is for IDENTIFICATION of a person.
Some additional clarification or comments that might be helpful are: Biometrics establish authentication using specific information and comparing results to expected data. It does not perform well for identification purposes such as scanning for a person's face in a moving crowd for example.
Identification methods could include: username, user ID, account number, PIN, certificate, token, smart card, biometric device or badge.
Auditing is a process of logging or tracking what was done after the identity and authentication process is completed.
Authorization is the rights the subject is given and is performed after the identity is established.
Reference OIG (2007) p148, 167
Authentication in biometrics is a "one-to-one" search to verify claim to an identity made by a person.


Reference:

KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, 2001, John Wiley & Sons, Page 38.



What is called the percentage of valid subjects that are falsely rejected by a Biometric Authentication system?

  1. False Rejection Rate (FRR) or Type I Error
  2. False Acceptance Rate (FAR) or Type II Error
  3. Crossover Error Rate (CER)
  4. True Rejection Rate (TRR) or Type III Error

Answer(s): A

Explanation:

The percentage of valid subjects that are falsely rejected is called the False Rejection Rate (FRR) or Type I Error.


Reference:

KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, 2001, John Wiley & Sons, Page 38.



Share your comments for ISC SSCP exam with other users:

P
p das
12/7/2023 11:41:00 PM

very good questions

A
Anna
1/5/2024 1:12:00 AM

i am confused about the answers to the questions. are the answers correct?

B
Bhavya
9/13/2023 10:15:00 AM

very usefull

R
Rahul Kumar
8/31/2023 12:30:00 PM

need certification.

D
Diran Ole
9/17/2023 5:15:00 PM

great exam prep

V
Venkata Subbarao Bandaru
6/24/2023 8:45:00 AM

i require dump

D
D
7/15/2023 1:38:00 AM

good morning, could you please upload this exam again,

A
Ann
9/15/2023 5:39:00 PM

hi can you please upload the dumps for sap contingent module. thanks

S
Sridhar
1/16/2024 9:19:00 PM

good questions

S
Summer
10/4/2023 9:57:00 PM

looking forward to the real exam

V
vv
12/2/2023 2:45:00 PM

good ones for exam preparation

D
Danny Zas
9/15/2023 4:45:00 AM

this is a good experience

S
SM 1211
10/12/2023 10:06:00 PM

hi everyone

A
A
10/2/2023 6:08:00 PM

waiting for the dump. please upload.

A
Anonymous
7/16/2023 11:05:00 AM

upload cks exam questions

J
Johan
12/13/2023 8:16:00 AM

awesome training material

P
PC
7/28/2023 3:49:00 PM

where is dump

Y
YoloStar Yoloing
10/22/2023 9:58:00 PM

q. 289 - the correct answer should be b not d, since the question asks for the most secure way to provide access to a s3 bucket (a single one), and by principle of the least privilege you should not be giving access to all buckets.

Z
Zelalem Nega
5/14/2023 12:45:00 PM

please i need if possible h12-831,

U
unknown-R
11/23/2023 7:36:00 AM

good collection of questions and solution for pl500 certification

S
Swaminathan
5/11/2023 9:59:00 AM

i would like to appear the exam.

V
Veenu
10/24/2023 6:26:00 AM

i am very happy as i cleared my comptia a+ 220-1101 exam. i studied from as it has all exam dumps and mock tests available. i got 91% on the test.

K
Karan
5/17/2023 4:26:00 AM

need this dump

R
Ramesh Kutumbaka
12/30/2023 11:17:00 PM

its really good to eventuate knowledge before appearing for the actual exam.

A
anonymous
7/20/2023 10:31:00 PM

this is great

X
Xenofon
6/26/2023 9:35:00 AM

please i want the questions to pass the exam

D
Diego
1/21/2024 8:21:00 PM

i need to pass exam

V
Vichhai
12/25/2023 3:25:00 AM

great, i appreciate it.

P
P Simon
8/25/2023 2:39:00 AM

please could you upload (isc)2 certified in cybersecurity (cc) exam questions

K
Karim
10/8/2023 8:34:00 PM

good questions, wrong answers

I
Itumeleng
1/6/2024 12:53:00 PM

im preparing for exams

M
MS
1/19/2024 2:56:00 PM

question no: 42 isnt azure vm an iaas solution? so, shouldnt the answer be "no"?

K
keylly
11/28/2023 10:10:00 AM

im study azure

D
dorcas
9/22/2023 8:08:00 AM

i need this now

AI Tutor 👋 I’m here to help!